Advertisement

Anonymous mutual authentication with location privacy support for secure communication in M2M home network services

  • Prosanta GopeEmail author
Original Research
  • 95 Downloads

Abstract

Machine to machine (M2M) communications have significant application potential in the emerging networks including home network. The advent of M2M communication brings numerous security issues as well, while existing efforts have not fully solved those issues. In this article, we propose a secure lightweight anonymous authentication and key agreement protocol for M2M home network service, which can guarantee to resist various security issues like, forgery attacks, insider attacks, masquerade attacks, resilience to key exposure, etc. Furthermore, the proposed protocol generates reasonable additional computational and communication overhead, which is also verified by performance analysis.

Keywords

Privacy Anonymity Authentication Home network M2M 

References

  1. Cha I, Shah Y, Schmidt AU et al (2009) Trust in M2M communication. Veh Technol Mag 4(3):69–571CrossRefGoogle Scholar
  2. Cox L, Dalton A, Marupadi V (2015) SmokeScreen: flexible privacy controls for presence-sharing. In: Proceedings of the 5th international conference on mobile systems applications and services, pp. 233–245Google Scholar
  3. Crypto++ Library (2012) http://www.cryptopp.com. Accessed 12 Aug 2017
  4. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208MathSciNetCrossRefzbMATHGoogle Scholar
  5. Douglas RS (1994) Universal hashing and authentication codes. Des Codes Cryptogr 4(4):369–380MathSciNetzbMATHGoogle Scholar
  6. Du J, Chao SW (2010) A study of information security for M2M of IOT. In: Proceedings of the 3rd international conference on advanced computer theory and engineering, pp. 576–579Google Scholar
  7. Gope P (2017) Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks. J Inf Secur Appl 35:160–167Google Scholar
  8. Gope P, Das AK (2017) Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet Things J.  https://doi.org/10.1109/JIOT.2017.2723915 Google Scholar
  9. Gope P et al. (2017) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener Comput Syst.  https://doi.org/10.1016/j.future.2017.06.023 Google Scholar
  10. Jeong J, Chung MY (2008) Integrated OTP-based user authentication scheme using smart cards in home networks. In: Proceedings of the 41st Hawaii international conference on system sciences, pp. 294–294Google Scholar
  11. Juang W, Chen S, Liaw H (2008) Robust and efficient pass-word-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556CrossRefGoogle Scholar
  12. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of the international cryptology conference, pp. 388–397Google Scholar
  13. Kumari S (2016) Design flaws of an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl.  https://doi.org/10.1007/s11042-016-3771-x Google Scholar
  14. Kumari S, Li X, Wu F, Shen J (2017) Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener Comput Syst 68:320–330CrossRefGoogle Scholar
  15. Lai Y, Kang J, Yu R (2013) Efficient and secure resource management in home M2M networks. Int J Distrib Sens Netw 16:12–18Google Scholar
  16. Lee YK, Ju H, Kim DW (2006) Home network modelling and home network user authentication mechanism using biometric information. In: Proceedings of the 10th international symposium on consumer electronics, pp. 1–5Google Scholar
  17. Lee HK, Lee JY, Han JW (2008) The efficient security architecture for authentication and authorization in the home network. In: Proceedings of the 3rd international conference on natural computation, pp. 713–717Google Scholar
  18. National Bureau of Standards (1980) NBS FIPS PUB 81: DES modes of operation. U.S. Department of Commerce. https://csrc.nist.gov/csrc/media/publications/fips/81/archive/1980-12-02/documents/fips81.pdf
  19. Nguyen TD, Aymen AS, Huh EN (2010) A dynamic ID-based authentication scheme. In: Proceedings of the 6th international conference on networked computing and advanced information management, pp. 248–253Google Scholar
  20. Sun X, Men S, Zhao C, Zhou Z, Zhou Z (2012) A security authentication scheme in machine-to-machine home network service. Secur Commun Netw.  https://doi.org/10.1002/sec.551 Google Scholar
  21. Suna G, Xiea Y, Liao D, Yua H, Chang V (2017) User-defined privacy location-sharing system in mobile online social networks. J Netw Comput Appl 86:34–45CrossRefGoogle Scholar
  22. Xu T, Cai Y (2007) Location anonymity in continuous location-based services. In: Proceedings of the 15th ACM international symposium on advances in geographic information systems, pp. 1–8Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceNational University of SingaporeSingaporeSingapore

Personalised recommendations